About your Search

20121112
20121120
Search Results 0 to 3 of about 4 (some duplicates have been removed)
zone. the other extreme is you can look at fbi statistics. you'll see that border areas have less murders. i do not want to get into definitional debate. we can talk about what spillover is. >> you commented. you work yourself as a sponsor for additional resources. i am grateful for you doing that. you brought us the general report. to say that it is improper to say that there is -- washington is in denial. to attack two of our nation's senior military professionals, like you did in the congressional hearing, and when they were merely giving their reflection of what is going on based on their decades of experience -- you are dead wrong. i want to follow up with that. here is why washington is in denial -- the president of the united states comes to the state and makes jokes about the safety and security of our country and joking about the border being safer than ever. we have had 140 dead bodies discovered in the last year alone on two rural texas counties. the statistics are great. no amount of statistics can cover up the bullet holes. >> you say they are not always accurate. wha
.s. oil output and efforts to make the country energy independent. the former fbi assistant director talks about the fbi role in investigating cyber- related crimes.
. our friends from the fbi were talking earlier about a number of these -- let's start with the criminal groups. organized crime, they can have a systemic content. they want to also may be pro the law enforcement sensitive systems to get information to understand what threats against them are. then there are small-time criminal operations intent on fraud or identity theft. these may be small groups or individuals. then you look at hackers, those who are just the techno geeks to do it to see if they can, go after systems not protected. then of course the hackers can be hired by any of these other -- origins to further their crimes. we have insiders, could be disgruntled employees who want to harm that information system and disrupt the company or agency's operation. or the insider could be a spy. taking that information and passing it to his or her handler and passing it to a foreign intelligence service. then we have nations and state- sponsored threats. i do not want to steal any thunder from dr. jones's presentation on chinese threats tomorrow, but i want to talk about, there were some
Search Results 0 to 3 of about 4 (some duplicates have been removed)

Terms of Use (10 Mar 2001)